Adrian Dabrowski

is researcher at SBA Research.Adrian

  • E-Mail
  • Phone: +43 (1) 505 36 88
  • Fax: +43 (1) 505 88 88
  • PGP ID: 0xDB1E4E76
  • PGP Fingerprint: 43EC 0F2B 8881 E26F 62A5 013F 7959 474F DB1E 4E76
  • Google Scholar

Research Interest

His research interests cover RFID, cyberphysical security, hardware security and privacy enhancing technologies.

Bio

Adrian Dabrowski graduated from TU Wien and is currently a PhD candidate. He participated and later organized the Viennese iCTF team, winning two times. He received the IEEE Austria Diploma Thesis Award and was nominated for the Distinguished Young Alumnus Award of the Faculty of Informatics, UT Vienna. His ACSAC 2014 paper won the Best Student Paper Award.

Before that, he made several media appearances concerning security of systems in public use and taught part-time at a technical high school. He has been speaker at several Computer Chaos Club (CCC) conferences, as well as SIGINT, B-Sides, PrivacyOS and Forum Alpbach. In spring 2013 and winter 2014/15, he visited the Echizen Group at the National Institute of Informatics in Tokyo.

Top Publications:

  • Framework based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing (2013)
    • INPROCEEDINGS--
    • Adrian Dabrowski and Edgar R. Weippl and Isao Echizen
    • Proceedings of the 2013 IEEE International Conference on Systems, Man, and Cybernetics (SMC2013)
    @INPROCEEDINGS{Dabrowski2013Framework,
       author = {Adrian Dabrowski and {Edgar R.} Weippl and Isao Echizen},
       title = {Framework based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing},
       booktitle = {Proceedings of the 2013 IEEE International Conference on Systems,
       Man,
       and Cybernetics (SMC2013)},
       year = {2013},
       month = {10},
    }
  • IMSI-Catch Me If You Can: IMSI-Catcher-Catchers (2014)
    • INPROCEEDINGStruetrue
    • Adrian Dabrowski and Nicola Pianta and Thomas Klepp and Martin Schmiedecker and Edgar R. Weippl
    • Annual Computer Security Applications Conference (ACSAC)
    @INPROCEEDINGS{Dabrowski2014IMSICatch,
       author = {Adrian Dabrowski and Nicola Pianta and Thomas Klepp and Martin Schmiedecker and {Edgar R.} Weippl},
       authorhotlist = {true},
       sbahotlist = {true},
       title = {IMSI-Catch Me If You Can: IMSI-Catcher-Catchers},
       booktitle = {Annual Computer Security Applications Conference (ACSAC)},
       year = {2014},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/DabrowskiEtAl-IMSI-Catcher-Catcher-ACSAC2014.pdf},
       link_source = {http://sourceforge.net/p/icc/},
    }
  • QR - Inception: Barcode in Barcode Attacks (2014)
    • INPROCEEDINGS-true
    • Adrian Dabrowski and Katharina Krombholz and Johanna Ullrich and Edgar R. Weippl
    • 4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)
    @INPROCEEDINGS{Dabrowski2014Inception,
       author = {Adrian Dabrowski and Katharina Krombholz and Johanna Ullrich and {Edgar R.} Weippl},
       authorhotlist = {true},
       title = {QR - Inception: Barcode in Barcode Attacks},
       booktitle = {4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)},
       year = {2014},
       month = {11},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/qrinception.pdf},
       link_slides = {http://www.slideshare.net/SBAResearch/qrinception-barcode-in-barcode-attacks},
    }
  • Poster NDSS 2014: Hardware Trojans--Detect and React? (2014)
    • ARTICLE--
    • Adrian Dabrowski and Peter Fejes and Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Edgar R. Weippl
    • Network and Distributed System Security (NDSS) Symposium 2014
    @ARTICLE{Dabrowski2014Poster,
       author = {Adrian Dabrowski and Peter Fejes and Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and {Edgar R.} Weippl},
       title = {Poster NDSS 2014: Hardware Trojans--Detect and React?},
       journal = {Network and Distributed System Security (NDSS) Symposium 2014},
       year = {2014},
       month = {2},
    }
  • Towards a Hardware Trojan Detection Cycle (2014)
    • INPROCEEDINGStrue-
    • Adrian Dabrowski and Heidelinde Hobel and Johanna Ullrich and Katharina Krombholz and Edgar R. Weippl
    • Second International Workshop on Emerging Cyberthreats and Countermeasures, ARES ECTCM 2014
    @INPROCEEDINGS{Dabrowski2014Towards,
       author = {Adrian Dabrowski and Heidelinde Hobel and Johanna Ullrich and Katharina Krombholz and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {Towards a Hardware Trojan Detection Cycle},
       booktitle = {Second International Workshop on Emerging Cyberthreats and Countermeasures,
       ARES ECTCM 2014},
       year = {2014},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/towards a hardware trojan _paper.pdf},
    }
  • Error-Correcting Codes as Source for Decoding Ambiguity (2015)
    • INPROCEEDINGS--
    • Adrian Dabrowski and Isao Echizen and Edgar R. Weippl
    • LangSec Workshop at IEEE Security & Privacy
    @INPROCEEDINGS{Dabrowski2015ErrorCorrecting,
       author = {Adrian Dabrowski and Isao Echizen and {Edgar R.} Weippl},
       title = {Error-Correcting Codes as Source for Decoding Ambiguity},
       booktitle = {LangSec Workshop at IEEE Security & Privacy},
       year = {2015},
       month = {21},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ecc.pdf},
       volume = {10},
    }
  • Leveraging Competitive Gamification for Sustainable Fun and Profit in Security Education (2015)
    • INPROCEEDINGS--
    • Adrian Dabrowski and Markus Kammerstetter and Eduard Thamm and Edgar R. Weippl and Wolfgang Kastner
    • USENIX Summit on Gaming, Games and Gamification in Security Education (3GSE 2015) at USENIX Security Symposiom 2015
    @INPROCEEDINGS{Dabrowski2015Leveraging,
       author = {Adrian Dabrowski and Markus Kammerstetter and Eduard Thamm and {Edgar R.} Weippl and Wolfgang Kastner},
       title = {Leveraging Competitive Gamification for Sustainable Fun and Profit in Security Education},
       booktitle = {USENIX Summit on Gaming,
       Games and Gamification in Security Education (3GSE 2015) at USENIX Security Symposiom 2015},
       year = {2015},
       month = {8},
       pdf = {https://www.usenix.org/system/files/conference/3gse15/3gse15-dabrowski.pdf},
    }
  • Smart Privacy Visor: Bridging the Privacy Gap (2015)
    • INPROCEEDINGS--
    • Adrian Dabrowski and Katharina Krombholz and Edgar R. Weippl and Isao Echizen
    • Workshop on Privacy by Transparency in Data-Centric Services (BIS 2015)
    @INPROCEEDINGS{Dabrowski2015Smart,
       author = {Adrian Dabrowski and Katharina Krombholz and {Edgar R.} Weippl and Isao Echizen},
       title = {Smart Privacy Visor: Bridging the Privacy Gap},
       booktitle = {Workshop on Privacy by Transparency in Data-Centric Services (BIS 2015)},
       year = {2015},
       month = {6},
       pdf = {http://link.springer.com/chapter/10.1007/978-3-319-26762-3_21},
    }
  • Browser History Stealing with Captive Wi-Fi Portals (2016)
    • INPROCEEDINGS--
    • Adrian Dabrowski and Georg Merzdovnik and Nikolaus Kommenda and Edgar R. Weippl
    • Proceedings of Workshops at IEEE Security & Privacy 2016, Mobile Security Technologies (MoST)
    @INPROCEEDINGS{Dabrowski2016Browser,
       author = {Adrian Dabrowski and Georg Merzdovnik and Nikolaus Kommenda and {Edgar R.} Weippl},
       title = {Browser History Stealing with Captive Wi-Fi Portals},
       booktitle = {Proceedings of Workshops at IEEE Security & Privacy 2016,
       Mobile Security Technologies (MoST)},
       year = {2016},
       month = {5},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Dabrowski2016Browser.pdf},
    }
  • The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection (2016)
    • INPROCEEDINGStrue-
    • Adrian Dabrowski and Georg Petzl and Edgar R. Weippl
    • 19th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2016)
    @INPROCEEDINGS{Dabrowski2016Messenger,
       author = {Adrian Dabrowski and Georg Petzl and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection},
       booktitle = {19th International Symposium on Research in Attacks,
       Intrusions and Defenses (RAID 2016)},
       year = {2016},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/providerICdetection.pdf},
    }
  • Mobile Phone's Wi-Fi Presence for Continuous Implicit Secondary Deauthentication (2016)
    • INPROCEEDINGS--
    • Adrian Dabrowski and Edgar R. Weippl
    • 11th International Conference on Passwords
    @INPROCEEDINGS{Dabrowski2016Mobile,
       author = {Adrian Dabrowski and {Edgar R.} Weippl},
       title = {Mobile Phone's Wi-Fi Presence for Continuous Implicit Secondary Deauthentication},
       booktitle = {11th International Conference on Passwords},
       year = {2016},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/wifipresence.pdf},
       link_video = {https://www.youtube.com/watch?v=6fC58E1XAAw&list=PLdIqs92nsIzT2ao_wAJ2GCRKl_3zaebgb&index=2},
    }
  • Grid Shock: Coordinated Load-Change Attacks on Power Grids (2017)
    • INPROCEEDINGStrue-
    • Adrian Dabrowski and Johanna Ullrich and Edgar R. Weippl
    • Annual Computer Security Applications Conference (ACSAC) 2017
    @INPROCEEDINGS{Dabrowski2017Grid,
       author = {Adrian Dabrowski and Johanna Ullrich and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {Grid Shock: Coordinated Load-Change Attacks on Power Grids},
       booktitle = {Annual Computer Security Applications Conference (ACSAC) 2017},
       year = {2017},
       month = {12},
    }
  • Tag Detection for Preventing Unauthorized Face Image Processing (2014)
    • INPROCEEDINGS--
    • Alberto Escalada Jimenez and Adrian Dabrowski and Juan M. Montero Martinez and Isao Echizen
    • Proceedings of the 13th International Workshop on Digital-Forensics and Watermarking (IWDW 2014)
    @INPROCEEDINGS{Jimenez2014Detection,
       author = {{Alberto Escalada} Jimenez and Adrian Dabrowski and {Juan M.} {Montero Martinez} and Isao Echizen},
       title = {Tag Detection for Preventing Unauthorized Face Image Processing},
       booktitle = {Proceedings of the 13th International Workshop on Digital-Forensics and Watermarking (IWDW 2014)},
       year = {2014},
       month = {10},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/judmayer_KNX_wfcs2014.pdf},
    }
  • Hardware Malware (2013)
    • ARTICLE--
    • Christian Krieg and Adrian Dabrowski and Heidelinde Hobel and Katharina Krombholz and Edgar R. Weippl
    • Synthesis Lectures on Information Security, Privacy, and Trust
    @ARTICLE{Krieg2013Hardware,
       author = {Christian Krieg and Adrian Dabrowski and Heidelinde Hobel and Katharina Krombholz and {Edgar R.} Weippl},
       title = {Hardware Malware},
       journal = {Synthesis Lectures on Information Security,
       Privacy,
       and Trust},
       year = {2013},
       month = {11},
       volume = {4},
       pages = {1-115},
    }
  • Ok Glass, Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing (2015)
    • INPROCEEDINGS--
    • Katharina Krombholz and Adrian Dabrowski and Matthew Smith and Edgar R. Weippl
    • 1st Workshop on Wearable Security and Privacy
    @INPROCEEDINGS{Krombholz2015Glass,
       author = {Katharina Krombholz and Adrian Dabrowski and Matthew Smith and {Edgar R.} Weippl},
       title = {Ok Glass,
       Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing},
       booktitle = {1st Workshop on Wearable Security and Privacy},
       year = {2015},
       month = {1},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Ok Glass.pdf},
    }
  • Exploring Design Directions for Wearable Privacy (2017)
    • INPROCEEDINGS--
    • Katharina Krombholz and Adrian Dabrowski and Matthew Smith and Edgar R. Weippl
    • Usable Security
    @INPROCEEDINGS{Krombholz2017Exploring,
       author = {Katharina Krombholz and Adrian Dabrowski and Matthew Smith and {Edgar R.} Weippl},
       title = {Exploring Design Directions for Wearable Privacy},
       booktitle = {Usable Security},
       year = {2017},
       month = {0},
       pdf = {https://www.internetsociety.org/sites/default/files/usec2017_03_2_Krombholz_paper.pdf},
    }
  • IPv6 Security: Attacks and Countermeasures in a Nutshell (2014)
    • INPROCEEDINGS-true
    • Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and Edgar R. Weippl
    • 8th USENIX Workshop on Offensive Technologies (WOOT)
    @INPROCEEDINGS{Ullrich2014IPv6,
       author = {Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and {Edgar R.} Weippl},
       authorhotlist = {true},
       title = {IPv6 Security: Attacks and Countermeasures in a Nutshell},
       booktitle = {8th USENIX Workshop on Offensive Technologies (WOOT)},
       year = {2014},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Johanna IPv6.pdf},
       link_slides = {http://de.slideshare.net/SBAResearch/ipv6-security-attacks-and-countermeasures-in-a-nutshell},
    }
  • IPv6 Security: Attacks and Countermeasures in a Nutshell (2015)
    • ARTICLE--
    • Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and Edgar R. Weippl
    • Magdeburger Journal zur Sicherheitsforschung
    @ARTICLE{Ullrich2015IPv6,
       author = {Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and {Edgar R.} Weippl},
       title = {IPv6 Security: Attacks and Countermeasures in a Nutshell},
       journal = {Magdeburger Journal zur Sicherheitsforschung},
       year = {2015},
       month = {3},
       pdf = {http://www.sicherheitsforschung-magdeburg.de/uploads/journal/MJS_035_Ullrich_IPv6.pdf},
       volume = {1},
    }

Further website

See also http://www.iseclab.org/people/atrox/

 

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close